Page 1
Ethernet Routing Switch 1600, 8300, 8600, 2500, 4500, 5500 Ethernet Switch 460/470 Engineering Authentication, Authorization and Accounting (AAA) for ERS and ES Technical Configuration Guide E.M.E.A. IP Core Sales Engineering Document Date: November 2010 Document Number : NN48500-558 Document Version: 1.1...
Page 2
Unauthorized reproduction, transmission, dissemination, storage, and or use without the express written consent of Avaya can be a criminal, as well as a civil offense under the applicable law.
Page 3
Abstract This document provides examples on configuring RADIUS & TACACS+ on the ERS 1600, 8300, 8600, 2500, 4500, 5500 and ES 460/470. This document covers some of the more popular Radius & TACACS+ commands and attributes how to configure server and client side. It gives also various examples with different users and details log files on client and server side.
Getting technical documentation ....................71 Getting product training ....................... 71 Getting help from a distributor or reseller ..................71 Getting technical support from the Avaya Web site ..............71 Authentication, Authorization and Accounting (AAA) for ERS and ES November 2010...
Page 5
Italic text in a Courier New font indicates text the user must enter or select in a menu item, button or command: ERS5520-48T# show running-config Output examples from Avaya devices are displayed in a Lucinda Console font: ERS5520-48T# show running-config ! Embedded ASCII Configuration Generator Script ! Model = Ethernet Routing Switch 5520-24T-PWR ! Software version = v5.0.0.011...
1. Overview Access control is the way you control who is allowed access to the network server and what services they are allowed to use once they have access. Authentication, authorization, and accounting (AAA) network security services provide the primary framework through which you set up access control on your network device or access server.
Page 7
2.1.1 RADIUS Authentication With RADIUS authentication, a remote RADIUS client can authenticate users attempting to log in. The RADIUS server also provides access authority. RADIUS assists network security and authorization by managing a database of users. The switch can use the database to verify user names and passwords, as well as information about the type of access priority available to the user.
Page 9
2.1.2 RADIUS Accounting RADIUS accounting logs all of the activity of each remote user in a session on the centralized RADIUS accounting server. Session IDs for each RADIUS account are generated as 12-character strings. The first four characters in the string form a random number in hexadecimal format. The last eight characters in the string indicate, in hexadecimal format, the number of user sessions started since reboot.
Page 10
RADIUS Packet Format – RFC 2866 Identifier Code Length Response Authenticator Attributes ... RADIUS Codes Accounting-Request Accounting-Response RADIUS Attributes Acct-Status-Type Acct-Session-Time Acct-Delay-Time Acct-Input-Packets Acct-Input-Octets Acct-Output-Packets Acct-Output-Octets Acct-Terminate-Cause Acct-Session-Id Acct-Multi-Session-Id Acct-Authentic Acct-Link-Count Radius Attribute 40 : Acct-Status-Type. Length : 6 Value : The Value field is four octets.
CLI commands. 2.1.6 RADIUS SNMP Accounting RADIUS accounting will record the duration of the SNMP version 1, 2 or 3 session and the number of packets/octets sent and received during the SNMP session. 2.2 Avaya Switches RADIUS Support RADIUS 802.1x RADIUS 802.1x...
2.3 RADIUS Server Configuration – Using FreeRadius The following RADIUS Server configuration is based on FreeRadius, www.freeradius.org. Once installed on a Linux host, there are several configuration files to edit as shown below 2.3.1 /etc/raddb/client.conf This file contains the NAS list with shared secret.
Page 13
The ES 460/470 and ERS 2500, 4500, 5500 switches each has two user access levels: read-only or read-write The ERS 1600, 8300 and 8600 switches each has six different user access levels: ro, l1, l2, l3, rw and rwa Authentication, Authorization and Accounting (AAA) for ERS and ES...
Two different product lines, ES 460/470 Series and ERS 2500, 4500, 5500 each has the same logic for configuration whereas the ERS 1600, 8300 and 8600 each has a different logic for configuration. Network diagram with RADIUS client and server can be simplified and summarized in the following diagram.
Page 15
2.4.1 ES 460/470 Series and ERS 2500, 4500, 5500 ACLI or JDM (Java Device Manager) can be used to configure the switch. For simplicity and readability, we will document command line interface commands assuming the RADIUS server IP address is 10.10.50.40, and the client shared secret is ―Dda‖...
Page 16
2.4.2 ERS 1600, 8300 and 8600 ACLI is or JDM (Java Device Manager) can be used to configure the switch, for simplicity and readability, we will document command line interface commands To configure RADIUS 8600A:6# config radius server create 10.10.50.40 secret Dda 8600A:6# config radius server create 10.10.50.40 secret Dda usedby eapol...
: N/A set : N/A With the ERS 1600, 8300, and 8600, you can change the RADIUS source IP address by using the following command : 8000A:6# config radius server create <ipaddr> secret <value> [usedby <value>] [port <value>] [priority <value>] [retry <value>] [timeout <value>] [enable <value>] [acct-port <value>] [acct-enable <value>]...
Page 18
Telnet to Switch with read-only user (bsro) type some commands 4548GT-PWR# show clock Current SNTP time 2008-02-21 15:52:36 GMT+01:00 Daylight saving time is DISABLED Time zone is set to 'METD', offset from UTC is 01:00 4548GT-PWR# conf t % Invalid input detected at '^' marker.
Page 19
Please note that the log file only displays the user access level (read-only). The log file does not contain any session statistics. 2.5.2 ES 460/470 Series and ERS 2500, 4500, 5500 – Read-Write User Connect to the device with telnet using read-only user (bsrw).
Page 20
Please note that the log file only displays the user access level (read-only). The log file does not contain any session statistics. 2.5.3 ERS 2500, 4500, 5500 – 802.1x (EAP) User For this example, we will connect an 802.1x (EAP) supplicant to the switch, authenticate the EAP supplicant, generate some traffic, and then disconnect.
Page 22
2.5.4 ERS 1600, 8300 and 8600 – Read-Only User For this example, we will connect to the switch using telnet via a read-only (ro) user. Telnet to Switch with read-only user (ro) type some commands 8600A:6> show date local time:...
Page 24
CPU6 [02/21/08 18:09:30] SW INFO Closed telnet connection from 10.10.50.10, user ro rcmd -2 2.5.5 ERS 1600, 8300 and 8600 – Read-Write User For this example, we will connect to the switch using telnet via a read-write (rwa) user. Telnet to Switch with read-write user (rwa) type some commands...
Page 25
Please note that the client-IP-Address is equal to NAS-IP-Address which is not correct. The client-IP-Address is the station where telnet has been issued, which is 10.10.50.10. The reason is the switch does not provide a Client-IP-address field (see sniffer trace). Application artificially copy field.
Page 26
2.5.6 ERS 1600, 8300, 8600 – 802.1x (EAP) User For this example, we will connect an 802.1x (EAP) Supplicant to the switch, authenticate, generate some traffic, and then disconnect. Log file on RADIUS server - /var/log/radius/radius.log Thu Feb 21 18:43:58 2008 : Auth: Login OK: [eap] (from client 8600 port 237 cli 00-12-3F-1A-1B-68) Log file on RADIUS server - /var/log/radius/radacct/10.10.50.1/auth-detail-20080221...
Page 28
To configure read-write (rw) user with commands “config ip” & “test” denied. /erc/raddb/users file to be edited on RADIUS server. Auth-Type == Local,User-Password == "rw" Access-Priority = rw, Command-Access = "False", Commands = "config ip", Commands += "test" You must enable user access profile (cli-profile) parameter on RADIUS client.
Page 29
Log file on RADIUS client 8600A:6# CPU6 [03/03/08 15:28:13] SW INFO user rw connected from 10.10.50.10 via telnet CPU6 [03/03/08 15:29:17] SW INFO Closed telnet connection from 10.10.50.10, user rw rcmd -2 Please note that accounting records for rw user will be similar to the ones for ro and rwa users already documented in chapter 2.5.4 and 2.5.5.
Page 30
: 180 The accounting will be done based on per SNMP Session which will record the duration of that particular session and the number of packets/octets received. Accounting is done for every session. The user for any SNMP session has to be added as ―snmp_user‖. At the beginning of any session, a start accounting message is sent to the RADIUS server.
Please note that accounting records for SNMP session will be similar to the ones for ro and rwa users already documented in chapter 2.5.4 and 2.5.5. 2.6 Sniffer Traces on RADIUS Server 2.6.1 RADIUS Authentication Read-Only User Frame 1 (98 bytes on wire, 98 bytes captured)
3. TACACS+ Ethernet Routing Switch 5500, 1600 and 8300 Series all support the Terminal Access Controller Access Control System plus (TACACS+) client. TACACS+ is a security application implemented as a client/server-based protocol that provides centralized validation of users attempting to gain access to a router or network access server.
3.2 Feature Operation During the log on process, the TACACS+ client initiates the TACACS+ authentication session with the server. After successful authentication, if TACACS+ authorization is enabled, the TACACS+ client initiates the TACACS+ authorization session with the server. After successful authentication, if TACACS+ accounting is enabled, the TACACS+ client sends accounting information to the TACACS+ server.
Page 41
You cannot enable both RADIUS and TACACS+ authentication on the same interface. However, you can enable RADIUS and TACACS+ on different interfaces; for example, RADIUS on the serial connection and TACACS+ on the Telnet connection. Prompts for log on and password occur prior during the authentication process. If TACACS+ fails because there are no valid servers, then the username and password ...
Page 42
3.2.3 TACACS+ Accounting TACACS+ accounting enables you to track: the services accessed by users the amount of network resources consumed by users When accounting is enabled, the NAS reports user activity to the TACACS+ server in the form of accounting records.
To support runtime switching of users to a particular privilege level, you must preconfigure a dummy user for that level on the daemon. The format of the user name for the dummy user is $enab<n>$, where <n> is the privilege level to which you want to allow access. 3.3 Avaya Switches TACACS+ Support TACACS+ TACACS+...
Page 44
The following table shows the scheme used to map the access levels to TACACS+ privilege levels. Access Level ERS 1600,8300 ERS 5500 none Authentication, Authorization and Accounting (AAA) for ERS and ES November 2010 Technical Configuration Guide...
3.4 TACACS+ Server Configuration – Using tac_plus The following TACACS+ Server configuration is based on tac_plus, www.networkforums.net. Once installed on a Linux host, there is a unique configuration file to edit as shown below. 3.4.1 /etc/tacacs/tac_plus.cfg This file contains all configuration parameters for TACACS+.
Two different product lines, ERS 5500 (and 2500, 4500 in the future) use a specific logic for configuration whereas ERS 1600, 8300 (and 8600 in the future) each uses a different logic for configuration. Network diagram with TACAC+ client and server can be simplified and summarized as shown below:...
Page 48
You get the following message at console: no response from TACACS+ servers 3.5.2 ERS 1600, 8300 ACLI or JDM (Java Device Manager) can be used to configure the switch, for simplicity and readability, we will document command line interface commands:...
: N/A set : N/A With the ERS 1600 and 8300, you can change the TACACS+ source IP address by using the following command. Config tacacs server create <ipaddr> <value> [port <value>] [priority <value>] [timeout <value>] [single-connection <value>]...
Page 50
Telnet to Switch with read-only user (ro) type some commands 5510<level-1>> en 5510<level-1># show clock Current SNTP time 2008-02-26 14:33:17 GMT+01:00 Daylight saving time is DISABLED Time Zone is set to 'METD', offset from UTC is 01:00 5510<level-1># conf t %Your command was not authorized 5510<level-1># exit...
Page 51
Tue Feb 26 14:30:10 2008 [16405]: do_author: user 'ro' found Tue Feb 26 14:30:10 2008 [16405]: exec authorization request for ro Tue Feb 26 14:30:10 2008 [16405]: exec is explicitly permitted by line 97 Tue Feb 26 14:30:10 2008 [16405]: author_svc: nas:service=shell (passed thru)
Page 52
Log file on TACACS+ client 2008-02-26 14:30:05 GMT+01:00 139 #1 Successful connection from IP address: 10.10.50.10 2008-02-26 14:30:34 GMT+01:00 140 #1 Session closed (user logout), IP address: 10.10.50.10, access mode: no security 2008-02-26 14:30:35 GMT+01:00 141 #1 Connection closed (user logout), IP address: 10.10.50.10...
Page 53
Log file on TACACS server - /var/log/tac_plus.log Depends on debug value configured /etc/rc5.d/S99tac_plus Tue Feb 26 14:35:12 2008 [16434]: verify: login access for user 'bsrw' to port Telnet Session 1 on 10.10.55.6 from 10.10.50.10 Tue Feb 26 14:35:12 2008 [16434]: cfg_check_host_group_access: checking login access to host '10.10.55.6' for user 'bsrw'...
Page 54
Tue Feb 26 14:35:21 2008 [16438]: authorization query for 'bsrw' unknown from 10.10.55.6 accepted Tue Feb 26 14:35:24 2008 [16439]: Start authorization request Tue Feb 26 14:35:24 2008 [16439]: do_author: user 'bsrw' found Tue Feb 26 14:35:24 2008 [16439]: authorize_cmd: configure terminal...
Page 55
Log file on TACACS server - /var/log/tac_acc.log NO ENTRY. Please note that ERS 1600 and 8300 does not support TACACS+ accounting. Log file on TACACS server - /var/log/tac_plus.log Depends on debug value configured /etc/rc5.d/S99tac_plus Tue Feb 26 16:49:21 2008 [16476]: verify: login access for user 'ro' to port on 10.10.50.5 from 10.10.50.5...
Page 56
Tue Feb 26 16:49:21 2008 [16476]: verify: login cleartext authentication successful Tue Feb 26 16:49:21 2008 [16476]: default_fn: login query for 'ro' unknown- port from 10.10.50.5 accepted Tue Feb 26 16:49:21 2008 [16477]: Start authorization request Tue Feb 26 16:49:21 2008 [16477]: do_author: user 'ro' found...
Page 57
Log file on TACACS server - /var/log/tac_acc.log NO ENTRY. Please note that ERS 1600 and 8300 does not support TACACS+ accounting. Log file on TACACS server - /var/log/tac_plus.log Depends on debug value configured /etc/rc5.d/S99tac_plus Tue Feb 26 17:27:24 2008 [16484]: verify: login access for user 'rwa' to port on 10.10.50.5 from 10.10.50.5...
Page 58
Tue Feb 26 17:27:24 2008 [16484]: verify: Using auth_method cleartext(11) with data rwa Tue Feb 26 17:27:24 2008 [16484]: Password has not expired <no expiry date set> Tue Feb 26 17:27:24 2008 [16484]: verify: login cleartext authentication successful Tue Feb 26 17:27:24 2008 [16484]: default_fn: login query for 'rwa' unknown- port from 10.10.50.5 accepted...
3.7 Sniffer Traces on TACACS+ Server 3.7.1 TACACS Read-Only User The following trace displays the TACAC+ tcp flows , including SYN/SYN ACK/ACK (summary line, not detailed). It includes authentication, authorization and accounting. Note that TACACS messages are encrypted and only part of the message can be decoded.
Page 60
Transmission Control Protocol, Src Port: 49 (49), Dst Port: 1190 (1190), Seq: 1, Ack: 50, Len: 28 TACACS+ Major version: TACACS+ Minor version: 0 Type: Authentication (1) Sequence number: 2 Flags: 0x00 (Encrypted payload, Multiple Connections) ..0 = Unencrypted: Not set ..
4. Customer service Visit the Avaya Web site to access the complete range of services and support that Avaya provides. Go www.avaya.com or go to one of the pages listed in the following sections. Getting technical documentation To download and print selected technical publications and release notes directly from the Internet, go to www.avaya.com/support.
Need help?
Do you have a question about the ERS 1600 and is the answer not in the manual?
Questions and answers